Building High Assurance Secure Applications using Security Patterns for Capability-Based Platforms

被引:0
|
作者
Rimba, Paul [1 ]
机构
[1] NICTA, Eveleigh, NSW, Australia
关键词
Security Patterns; Assurance; Capability; Platform; Whole System;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Building high assurance secure applications requires the proper use of security mechanisms and assurances provided by the underlying secure platform. However, applications are often built using security patterns and best practices that are agnostic with respect to the intricate specifics of the different underlying platforms. This independence from the underlying platform leaves a gap between security patterns and underlying secure platforms. In this PhD research abstract, we propose a novel approach to bridge this gap. Specifically, we propose reusable capability-specific design fragments for security patterns, which are specialization for patterns in a capability-based system. The focus is on systems that adhere to a capability-based security model, which we consider as the underlying platforms, to provide desired application-wide security properties. We also discuss assumptions and levels of assurance for these reusable designs and their use in the verification of application designs.
引用
收藏
页码:1401 / 1404
页数:4
相关论文
共 50 条
  • [1] Static Capability-based Security for Smart Contracts
    Schiffl, Jonas
    Weigl, Alexander
    Beckert, Bernhard
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES, DAPPS, 2023, : 110 - 117
  • [2] Secure and Efficient Capability-based Power Management in the Smart Grid
    Seo, Dongwon
    Lee, Heejo
    Perrig, Adrian
    [J]. 2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 119 - 126
  • [3] Capability-Based Planning for Australia's National Security
    Chim, Leung
    Nunes-Vaz, Rick
    Prandolini, Robert
    [J]. SECURITY CHALLENGES, 2010, 6 (03) : 79 - 96
  • [4] Capability-Based Security Enforcement in Named Data Networking
    Li, Qi
    Lee, Patrick P. C.
    Zhang, Peng
    Su, Purui
    He, Liang
    Ren, Kui
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (05) : 2719 - 2730
  • [5] CAPSTONE: A Capability-based Foundation for Trustless Secure Memory Access
    Yu, Jason Zhijingcheng
    Watt, Conrad
    Badole, Aditya
    Carlson, Trevor E.
    Saxena, Prateek
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 787 - 804
  • [6] Secure Component Based Applications Through Security Patterns
    Bouaziz, Rahma
    Coulette, Bernard
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 749 - 754
  • [7] High Assurance Security Products on COTS Platforms
    Blom, Rolf
    Schwarz, Oliver
    [J]. ERCIM NEWS, 2015, (102): : 39 - 40
  • [8] A capability-based security approach to manage access control in the Internet of Things
    Gusmeroli, Sergio
    Piccione, Salvatore
    Rotondi, Domenico
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1189 - 1205
  • [9] A Verified Capability-Based Model for Information Flow Security With Dynamic Policies
    Sun, Jianwen
    Long, Xiang
    Zhao, Yongwang
    [J]. IEEE ACCESS, 2018, 6 : 16395 - 16407
  • [10] Capability-based IoT access control using blockchain
    Liu, Yue
    Lu, Qinghua
    Chen, Shiping
    Qu, Qiang
    O'Connor, Hugo
    Choo, Kim-Kwang Raymond
    Zhang, He
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (04) : 463 - 469